Publisher
Springer Berlin Heidelberg
Reference22 articles.
1. Cohen [Benaloh], J.D., Fischer, M.J.: A robust and verifiable cryptographically secure election scheme (extended abstract). In: Proceedings of 26th Symposium on Foundations of Computer Science, pp. 372–382. IEEE (1985)
2. Boneh, D., Golle, P.: Almost entirely correct mixing with applications to voting. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security, pp. 68–77. ACM (2002)
3. e-voting security study. CESG, United Kingdom, Issue 1.2. (July 2002)
4. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)
5. Chaum, D.: Surevote (2000), http://www.surevote.com
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献